ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.

  • Threat management: Essential guide

    Sponsored by: ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • From Reactive to Proactive: How to Avoid Alert Fatigue

    Sponsored by: ThreatConnect

    Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • The Security Balancing Act

    Sponsored by: RES Software

    Learn the risks associated with mobile users and how to best protect your valuable data. Uncover best practices for securing your digital workforce and utilize a people-centric approach to managing security, governance, and identity and access management.

  • Remove the Security Blind Spots Created by Encrypted Traffic

    Sponsored by: Symantec & Blue Coat Systems

    Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.

  • 2016 Global Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.

  • New EU Security Requirements and You

    Sponsored by: Symantec & Blue Coat Systems

    Discover new EU security requirements and learn what you can do to get ready. Create a holistic approach to data protection and infrastructure security to best avoid compliance risk.

  • Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

    Sponsored by: TrendMicro

    See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.

  • A Path to Good Risk Taking Through Data Analytics

    Sponsored by: SAS

    This white paper explores the strategic benefit of making analytics an integral part of your risk management plan. Inside, learn 11 principles for enhancing risk management and the way banks are currently leveraging analytics for risk assessment. You'll also find some risk management success stories.

  • Firmwide Scenario Analysis and Stress Testing: Risk Perspective

    Sponsored by: SAS

    Stress testing is a vital aspect of any business' success. Special techniques have emerged in recent years after the recent financial crisis. Access this white paper to learn about the future of firmwide stress testing, the importance of risk management, and more.

  • Top Three Gaping Holes in Your Data Security

    Sponsored by: Globalscape

    Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Securing the Private Cloud

    Sponsored by: Fortinet, Inc.

    The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Mitigate Security Risks with Hyperconverged Infrastructure

    Sponsored by: SimpliVity

    Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.

  • SIEM Analysis Interfaces for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.

  • How To Foster Greater Collaboration and Support Enterprise Objectives Through Business Networks

    Sponsored by: Basware

    40% of B2B activity in the US, and 20% world-wide, is done electronically through business networks. Access this white paper to learn what business networks are capable of, and discover how to create circles of improved collaboration and support enterprise objectives.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.